{"id":287,"date":"2023-09-22T20:14:14","date_gmt":"2023-09-22T20:14:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/felipesoto\/?p=287"},"modified":"2023-10-31T19:10:09","modified_gmt":"2023-10-31T19:10:09","slug":"journal-entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/felipesoto\/2023\/09\/22\/journal-entry-3\/","title":{"rendered":"Journal Entry #3"},"content":{"rendered":"\n<p><strong>Describe four ethical issues that arise when storing electronic information about individuals:<\/strong><\/p>\n\n\n\n<p>     The four ethical issues I will discuss that arise when storing electronic information about individuals are Authorization\/Confidentiality, Implementation\/Security Engineering, Security &amp; Privacy, and lastly Integrity.&nbsp;<\/p>\n\n\n\n<p>     When having information about yourself or others stored in company and\/or an organizations database, it is essential that only those authorized to the confidential information have access to it. Authorization should also not solely be based on access, but a combination of access and why that information is needed. Authorization comes in many forms such as multi-factor or singular factor. Due to the nature of confidential information needing to be private, it is essential that certain authentication measures are in place to ensure the overall security of the private data. Without proper assurance\/authorization, confidential information is at risk of data leaks that could be detrimental to one\u2019s privacy. We want to ensure that there is no question that the individual trying to access the confidential information is who they say they are.<\/p>\n\n\n\n<p>Secondly Implementation and Security Engineering is another potential issue that can arise when storing electronic information. Without the successful implementation of security measures, individuals\u2019 data is susceptible to hacking and\/or theft. It is paramount to have proper security measures implemented to avoid potential leaks of private data.<\/p>\n\n\n\n<p>The third issue I will discuss is Security\/Privacy. Privacy is a big concern when individual information is stored because there is a line between what can and cannot be shared. For example, someone would not want their medical\/health information shared to anyone who isn\u2019t their doctor in the same way that they also would not want their credit card information leaked to an unauthorized user. The proper protection and disposal of private information is essential to avoid information being shared and\/or leaked to unwanted individuals.&nbsp;<\/p>\n\n\n\n<p>Lastly Integrity; integrity is vital when storing individuals\u2019 information digitally because it can affect one\u2019s livelihood.&nbsp;&nbsp;For example, imagine if your bank inaccurately logged your transactions that resulted in your account being overdraft, or your university having inaccurate grades for your assignments resulting in a lower GPA. Data integrity can be affected both intentionally and unintentionally. It is important to always verify data through data validation techniques to ensure that the information listed is precise and accurate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Describe four ethical issues that arise when storing electronic information about individuals: The four ethical issues I will discuss that arise when storing electronic information about individuals are Authorization\/Confidentiality, Implementation\/Security Engineering, Security &amp; Privacy, and lastly Integrity.&nbsp; When having information about yourself or others stored in company and\/or an organizations database, it is essential that&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/felipesoto\/2023\/09\/22\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":27228,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/users\/27228"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/posts\/287\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/felipesoto\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}